Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs Cisco Secure Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (7th), Mobile Data Protection (5th)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (25th), Endpoint Detection and Response (EDR) (19th), Cisco Security Portfolio (7th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Check Point Full Disk Encryption Software Blade is designed for Endpoint Encryption and holds a mindshare of 2.3%, up 1.3% compared to last year.
Cisco Secure Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.5% mindshare, down 1.8% since last year.
Endpoint Encryption
Endpoint Protection Platform (EPP)
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
Ahmed-Dawood - PeerSpot reviewer
A tool that offers good performance and technical support along with great protection to endpoint devices
The vendor from Cisco takes care of the maintenance. We need three people to take care of the tool in case of crashes. From the dashboard, we come to know about everything related to the endpoint. You can take action unless it is not the physical hardware to which something wrong has happened, especially if something wrong happens to the operating system. I would definitely recommend the solution to those planning to use it. To provide endpoint protection, I feel the product should be speedy enough to detect malicious programs and trojans. There are a lot of tools that are not acting as signature-based but as behavior-based antivirus. Cisco Secure Endpoint is required, especially if the customers don't have a sandbox. Overall, I rate the product an eight out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This software has helped individuals in the organization avoid data loss."
"It helps us maximize the operational efficiency and performance of our activities."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"It's easily scalable and adaptable to the needs of the business."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"It is a cross-platform tool."
"The solution provides complete security for one's workstation."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The solution’s most valuable feature is malware protection."
"With Cisco Secure Endpoint, we now have visibility over what is happening on the endpoint side."
"The VPN is most valuable. It's the best thing in the market today. We can use two-factor authentication with another platform, and we can authenticate with two-factor."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The most valuable feature is signature-based malware detection."
 

Cons

"Sometimes the performance rates are not consistent."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"I would like to bring centralized management to mobile devices."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"While the solution works as it should, it is overly expensive."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The tool should be able to recover data from a stolen device."
"The response time for technical support could be faster."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"It could be improved in connection with artificial intelligence and IoT."
"It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
"This product has issues with the number of false positives that it reports."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"I would like to see integration with Cisco Analytics."
"It's pretty good as it is, but its cost could be improved."
"In the next version of this solution, I would like to see the addition of local authentication."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"Its price is fair for us."
"The pricing and licensing of the security solutions of Cisco are very good in comparison with the competitors, but sometimes, it's difficult to see all the discounts and other kinds of things. So, you have to be careful, but the pricing is good."
"It is a subscription-based product."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"The price is very fair to the customer."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
"The pricing and licensing fees are okay."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
860,632 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Security Firm
13%
Financial Services Firm
8%
Government
8%
Computer Software Company
23%
Manufacturing Company
8%
Financial Services Firm
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Full Disk Encryption Software Blade?
The cost of licenses depends on the characteristics or implementation you are looking for.
What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
 

Also Known As

No data available
Cisco AMP for Endpoints
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: June 2025.
860,632 professionals have used our research since 2012.